You specify a nonzero value for the MEMORY_TARGET initialization parameter,but do not set the PGA_AGGREGATE_TARGET or the SGA_TARGET parameters. You restart your database instance.  Which statement about the result is true?()A、 The database instance star

题目

You specify a nonzero value for the MEMORY_TARGET initialization parameter,but do not set the PGA_AGGREGATE_TARGET or the SGA_TARGET parameters. You restart your database instance.  Which statement about the result is true?()

  • A、 The database instance starts,and Oracle sets the default value of SGA_TARGET to the same value as SGA_MAX_SIZE
  • B、 The database instance starts,and Oracle automatically tunes memory and allocates 60 percent to the  SGA and 40 percent to the PGA
  • C、 The database instance starts,but Automatic Memory Management is disabled
  • D、 The database instance will not start because you did not specify the PGA_AGGREGATE_TARGET or SGA_TARGET parameter

相似考题
参考答案和解析
正确答案:B
更多“You specify a no”相关问题
  • 第1题:

    Which two statements are true regarding the ORDER BY clause? ()

    • A、It is executed first in the query execution 
    • B、It must be the last clause in the SELECT statement 
    • C、It cannot be used in a SELECT statement containing a HAVING clause
    • D、You cannot specify a column name followed by an expression in this clause 
    • E、You can specify a combination of numeric positions and column names in this clause

    正确答案:B,E

  • 第2题:

    If you use ALTER DISKGROUP ... ADD DISK and specify a wildcard for the discovery string, what happens to disks that are already a part of the same or another disk group?()  

    • A、 The command fails unless you specify the FORCE option.
    • B、 The command fails unless you specify the REUSE option.
    • C、 The command must be reissued with a more specific discovery string.
    • D、 The other disks, already part of the disk group,are ignored.

    正确答案:D

  • 第3题:

    You have a computer that runs Windows 7. You configure the computer to automatically install all updates.You need to verify whether a specific update is installed.  What should you do?()

    • A、In Event Viewer, examine the Application log.
    • B、In Windows Update, examine the update history.
    • C、At the command prompt, run Wusa.exe and specify the /kb parameter.
    • D、At the command prompt, run Verifier.exe and specify the /query parameter.

    正确答案:B

  • 第4题:

    You need to ensure that the Cust_CalcData column is implemented appropriately. What should you do?()

    • A、Specify that the Cust_CalcData column must be implemented as a computed column of the table. 
    • B、Specify that the Cust_CalcData column must be indexed using a non-clustered index.
    • C、Specify that the Cust_CalcData column must be implemented as a column that uses a user-defined data type.
    • D、Specify that the Cust_CalcData column must be updated by a SQL Server Agent job that runs nightly.

    正确答案:A

  • 第5题:

    You need to design the Service Broker queues that will be used to submit requests for long-running reports. Your solution must minimize complexity of using the queues by applications. What should you do?()

    • A、Specify one queue for each client application that can submit report requests.
    • B、Specify one queue for each of the two report-generation services.
    • C、Specify one queue for all long-running report requests.
    • D、Specify eight queues:One for each service, and one for each client application.

    正确答案:B

  • 第6题:

    You have a computer that runs Windows Vista. You install Windows 7 on a new partition on the computer.You need to ensure that the computer always starts Windows Vista by default.  What should you do?()

    • A、Run Bcdedit.exe and specify the /default parameter.
    • B、Run Bcdedit.exe and specify the /bootems parameter.
    • C、Create a boot.ini file in the root of the Windows 7 partition.
    • D、Create a boot.ini file in the root of the Windows Vista partition.

    正确答案:A

  • 第7题:

    单选题
    If you use ALTER DISKGROUP ... ADD DISK and specify a wildcard for the discovery string, what happens to disks that are already a part of the same or another disk group?()
    A

     The command fails unless you specify the FORCE option.

    B

     The command fails unless you specify the REUSE option.

    C

     The command must be reissued with a more specific discovery string.

    D

     The other disks, already part of the disk group,are ignored.


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    You have an enterprise root certification authority (CA) that runs Windows Server 2008 R2.     You need to ensure that you can recover the private key of a certificate issued to a Web server.     What should you do()
    A

    From the ca, run the Get-PfxCertificate cmdlet.

    B

    From the Web server, run the Get-PfxCertificate cmdlet.

    C

    From the ca, run the certutil.exe tool and specify the -exportpfx parameter.

    D

    From the Web server, run the certutil.exe tool and specify the -exportpfx parameter.


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    You have created a resource plan, DB_PLAN, using DBMS_RESOURCE_MANAGER.CREATE_SIMPLE_PLAN and you want to impose a restriction on utilization of resources by the database users. Which step must be performed before you can start using the resource plan?()
    A

     assign users to consumer groups

    B

     set the resource plan for the instance

    C

     configure a simple resource plan and specify plan directives

    D

     configure a complex resource plan and specify plan directives


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()
    A

    Use the transport security mode and specify None for transport client credential type.

    B

    Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.

    C

    Use the message security mode and specify Basic for the transport client credential type.

    D

    Use the transportWithMessageCredential security mode and specify None for the transport client credential type.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    You have a computer that runs Windows 7. You configure the computer to automatically install all updates.You need to verify whether a specific update is installed.  What should you do?()
    A

    In Event Viewer, examine the Application log.

    B

    In Windows Update, examine the update history.

    C

    At the command prompt, run Wusa.exe and specify the /kb parameter.

    D

    At the command prompt, run Verifier.exe and specify the /query parameter.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    You have a computer that runs Windows Vista. The computer contains a custom application. You need toexport the user state and the settings of the custom application.  What should you do?()
    A

    Run Loadstate.exe and specify the /config parameter.

    B

    Run Scanstate.exe and specify the /genconfig parameter.

    C

    Modify the miguser.xml file. Run Loadstate.exe and specify the /ui parameter.

    D

    Modify the migapp.xml file. Run Scanstate.exe and specify the /i parameter.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    You are planning the creation of a new multitenant container database (CDB) and want to store the ROOT and SEED container data files in separate directories. You plan to create the database using SQL statements. Which three techniques can you use to achieve this?()

    • A、Use Oracle Managed Files (OMF).
    • B、Specify the SEED FILE_NAME_CONVERT clause.
    • C、Specify the PDB_FILE_NAME_CONVERT initialization parameter.
    • D、Specify the DB_FILE_NAMECONVERT initialization parameter.
    • E、Specify all files in the CREATE DATABASE statement without using Oracle managed Files (OMF).

    正确答案:A,B,C

  • 第14题:

    You are implementing transaction log shipping for a database named DB1 from a server named SQL1 to a server named SQL2. Because DB1 is 100 GB in size, it is too big to transfer over the network in a reasonable amount of time. You need to minimize the impact on the network while you initialize the secondary database. Which two actions should you perform?()

    • A、Specify the simple recovery model for DB1.
    • B、Specify either the full or the bulk-logged recovery model for DB1.
    • C、Perform a complete backup of DB1 to portable media. Restore the secondary database from that backup; specify the RECOVERY option.
    • D、Perform a complete backup of DB1 to portable media. Restore the secondary database from that backup; specify the STANDBY option.
    • E、Before you activate transaction log shipping to the secondary database, execute the following statement on the primary server.BACKUP LOG DB1 WITH TRUNCATE ONLY

    正确答案:B,D

  • 第15题:

    Your network contains a single Active Directory domain. All servers run Windows Server 2008 R2.   You deploy a new server that runs Windows Server 2008 R2. The server is not connected to the internalnetwork.   You need to ensure that the new server is already joined to the domain when it first connects to the  internal network.   What should you do()

    • A、From a domain controller, run sysprep.exe and specify the /oobe parameter. From the new server, run  sysprep.exe and specify the /generalize parameter.
    • B、From a domain controller, run sysprep.exe and specify the /generalize parameter. From the new server,  run sysprep.exe and specify the /oobe parameter.
    • C、From a domain-joined computer, run djoin.exe and specify the /provision parameter. From the new  server, run djoin.exe and specify the /requestodj parameter.
    • D、From a domain-joined computer, run djoin.exe and specify the /requestodj parameter. From the new  server, run djoin.exe and specify the /provision parameter.

    正确答案:C

  • 第16题:

    You are designing the settings for FinServ. You specify the permissions that will be used. You need to specify any additional settings required by the company. What should you do?()

    • A、Install a digital certificate for Encrypting File System (EFS) on FinServ
    • B、Activate failure auditing on the access to files and objects
    • C、Configure all firewalls to track when any packets addresses to FinServ are dropped
    • D、Create an IPSec policy that requires IPSec encryption between FinServ and the firewall

    正确答案:B

  • 第17题:

    You deploy a Windows 7 Enterprise image to a computer on the network. You need to display the detailedactivation and license status of the computer.  What should you run?()

    • A、Msconfig.exe.
    • B、Slui.exe.
    • C、Slmgr.vbs and specify the dli parameter.
    • D、W.inrm.vbs and specify the id parameter.

    正确答案:C

  • 第18题:

    You are creating a client application and configuring it to call a Windows Communication Foundation (WCF) service.When the application is deployed, it will be configured to send all messages to a WCF routing service. You need to ensure that the application can consume the target service after the application is deployed. What should you do?()

    • A、In the client application, add a service reference to the router service. In the client binding configuration, specify the address of the router service.
    • B、In the client application, add a service reference to the target service. In the client binding configuration, specify the address of the target service.
    • C、In the client application, add a service reference to the router service. In the client binding configuration, specify the address of the target service.
    • D、In the client application, add a service reference to the target service. In the client binding configuration, specify the address of the router service.

    正确答案:D

  • 第19题:

    单选题
    What parameters must you specify when you enable EIGRP routing?()
    A

    The broadcast address, and AS number

    B

    The network number and AS number

    C

    EIGRP routing, network number and passive interface

    D

    EIGRP routing, network number, and AS


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    You deploy a Windows 7 Enterprise image to a computer on the network. You need to display the detailedactivation and license status of the computer.  What should you run?()
    A

    Msconfig.exe.

    B

    Slui.exe.

    C

    Slmgr.vbs and specify the dli parameter.

    D

    W.inrm.vbs and specify the id parameter.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    You install a standalone root certification authority (CA) on a server named Server1. You need to ensure that every computer in the forest has a copy of the root CA certificate installed in the  local computers Trusted Root Certification Authorities store.   Which command should you run on Server1()
    A

    certreq.exe and specify the -accept parameter

    B

    certreq.exe and specify the -retrieve parameter

    C

    certutil.exe and specify the -dspublish parameter

    D

    certutil.exe and specify the -importcert parameter


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    You are the network administrator for The network is distributed across five countries in Europe, namely Spain, Italy, Hungary, Austria, and Germany. All network servers run Windows Server 2003. Each location has three print servers. You need to monitor usage of print queues on all print servers on the network. You plan to enable monitoring for each print server in the same way. Monitoring data must be stored in a central location and archived for five years to enable data comparison. What should you do?()
    A

    Create a counter log and specify SQL Database as the log file type.

    B

    Create a trace log and specify Circular Trace File as the log file type.

    C

    Create a counter log and specify Binary Circular File as the log file type.

    D

    Create a trace log and specify Sequential Trace File as the log file type.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    You have created a resource plan, DB_PLAN, using DBMS_RESOURCE_MANAGER.CREATE_SIMPLE_PLAN and you want to impose a restriction on utilization of resources by the database users.   Which step must be performed before you can start using the resource plan?()
    A

    assign users to consumer groups

    B

    set the resource plan for the instance

    C

    configure a simple resource plan and specify plan directives

    D

    configure a complex resource plan and specify plan directives


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    You have a computer that runs Windows 7. You run Runas and specify the /savecred parameter to start anapplication. You need to delete the stored password. What should you do?()
    A

    Run Del and specify the /p parameter.

    B

    Run Runas and specify the /noprofile parameter.

    C

    From Credential Manager, modify the Windows credentials.

    D

    From Authorization Manager, modify the Authorization Manager options.


    正确答案: A
    解析: 暂无解析